Data Sheets

Search Knowledge Center

Keyword Search

Resource Type

Date Range

Data Sheets

Business Continuity Disaster Recovery

Armor’s business continuity and disaster recovery (BC/DR) services, a feature of Armor Complete, are tailored to each client environment—minimizing the impact of an outage, no matter the cause. We work with you to create an effective recovery solution to ensure that you have predictable data coverage when you need it most.

Amy Bakameyer

Armor Incident Response & Forensics

As your business grows, your security and compliance protections need to grow with it. But defending on-premise infrastructure isn’t enough. Your organization’s IT security team needs to be able to see, defend, and respond to threats no matter where its infrastructure resides—and do it at a speed that outpaces not just today’s attackers but tomorrow’s as well.

Brooke Blackwell

Strategic Web Guru

Armor Vulnerability Scanning

Armor partners with approved scanning vendor (ASV), Rapid7, to deliver a vulnerability scanning service. This service helps customers navigate compliance, bolster security, and reduce risk. Developed and used by auditors, the vulnerability scanning service can help you achieve PCI DSS and HIPAA compliance.

Brooke Blackwell

Strategic Web Guru

Armor Malware Protection

To keep up with industry demand, businesses are innovating rapidly while reaping the benefits of virtualization in the digital economy. With this growth, threat actors are getting smarter—making it imperative to secure your on-premise, hybrid, hosted, and container environments effectively.

Learn more by reading our Malware Protection datasheet.

Amy Bakameyer

Dynamic Threat Blocking

Organizations suffer a daily barrage of cyberthreats across IP traffic, from phishing to malware, cryptojacking and cryptomining, to denial of service (DoS) attacks, among many others. Armor’s Dynamic Threat Blocking (DTB) is an IP reputation management (IPRM) service that protects your IT environment from communicating with malicious IP addresses at any layer—network, host, or application.

Amy Bakameyer

Armor Intrusion Detection System (IDS)

Armor Intrusion Detection services inspect traffic across your network (network-based), and to and from your hosts (host-based) while validating that activities taking place on your hosts are within acceptable norms. All security events are analyzed and correlated through Spartan, and alerts further investigated by our Security Operations Center.

Amy Bakameyer

Armor exists to protect. Each employee feels our passion, knows the vision and lives the company values. Diversity is key. Every role is important to Armor’s success. We volunteer our best every day and go to any length to ensure our customers are protected.